Description
Apache Qpid AMQP 0-x JMS client before 6.0.4 and JMS (AMQP 1.0) before 0.10.0 does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized object in a JMS ObjectMessage that is handled by the getObject function.
Remediation
References
http://packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.html
http://qpid.apache.org/components/jms/security.html
http://qpid.apache.org/components/jms/security-0-x.html
http://www.securityfocus.com/archive/1/538813/100/0/threaded
http://www.securityfocus.com/bid/91537
http://www.securitytracker.com/id/1036239
https://issues.apache.org/jira/browse/QPIDJMS-188
Related Vulnerabilities
CVE-2019-8331 Vulnerability in maven package org.fujion.webjars:bootstrap
CVE-2019-1003082 Vulnerability in maven package org.jenkins-ci.plugins:gearman-plugin
CVE-2020-1714 Vulnerability in maven package org.keycloak:keycloak-common
CVE-2022-29258 Vulnerability in maven package org.xwiki.platform:xwiki-platform-filter-ui
CVE-2020-28502 Vulnerability in maven package org.webjars.npm:xmlhttprequest